{"id":1067279,"date":"2023-12-10T02:41:57","date_gmt":"2023-12-10T07:41:57","guid":{"rendered":"https:\/\/www.immortalitymedicine.tv\/getting-ready-for-the-quantum-computing-era-thoughts-on-hybrid-cryptography-semiengineering\/"},"modified":"2024-08-18T11:32:43","modified_gmt":"2024-08-18T15:32:43","slug":"getting-ready-for-the-quantum-computing-era-thoughts-on-hybrid-cryptography-semiengineering","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/quantum-computing\/getting-ready-for-the-quantum-computing-era-thoughts-on-hybrid-cryptography-semiengineering.php","title":{"rendered":"Getting Ready For The Quantum Computing Era: Thoughts On Hybrid Cryptography &#8211; SemiEngineering"},"content":{"rendered":"<p><p>      Using a classical cryptographic algorithm alongside its      quantum safe equivalent.    <\/p>\n<p>    Once quantum computers, more specifically Cryptographically    Relevant Quantum Computers (CRQCs), have become powerful and    reliable enough, they will enable adversaries to break current    asymmetric encryption, placing important data and assets at    risk. New digital signatures and key encapsulation mechanisms    (KEMs) are needed, and while considerable progress has been    made in recent years to develop new quantum-resistant    algorithms, there is still ongoing discussions in the industry    about the best way to implement them in the various security    protocols that the industry requires.  <\/p>\n<p>    The concept of hybrid cryptography is to use two or more    fundamentally different algorithms that offer similar    cryptographic functionality. In the context of Quantum Safe    Cryptography more specifically, it refers to using a    combination of classical cryptographic algorithms, for example,    X25519 elliptic curve key exchange or ECDSA, in combination    with Quantum Safe equivalents such as ML-KEM \/ FIPS 203    and ML-DSA \/    FIPS 204.  <\/p>\n<p>    Hybrid cryptography comes in two flavors, which are sometimes    referred to as AND hybrid and OR hybrid. The latter, as the    name suggests, means that both algorithms are supported, and    protocols can choose which of the two algorithms they prefer.    This minimizes performance impact and is important to ensure    mission continuity during the transition to Quantum Safe    algorithms in heterogenous systems where not all components can    transition at the same time.  <\/p>\n<p>    On the other hand, it also means that communications protected    only by classical ECC \/ RSA cryptography are vulnerable to    CRQCs, and communications protected by Quantum Safe algorithms    suffer from the much newer, less tested code base for these    algorithms. On top of that, OR hybrid applications need to be    designed specifically to prevent downgrade attacks. OR hybrid    is more often simply subsumed within crypto agility    discussions.  <\/p>\n<p>    More often, when people talk about hybrid cryptography in the    context of Quantum Safe algorithms, they refer to the AND    hybrid model where both a classical and a Quantum Safe    algorithm are combined to ensure security even if one of the    algorithms or its implementation are broken. In the case of a    key exchange, for example, this means that the session key will    be derived in equal parts from a classical method such as    X25119 and a Quantum Safe algorithm such as ML-KEM \/ FIPS 203.    One example of this can be found in the provision of NIST    SP800-56C Rev 2 that allows concatenation of two session    secrets into a combined session secret from which the session    key is derived. Also, there are various RFC proposals such as,    for example, draft-tls-westerbaan-xyber768d00-0314 that are    actively being worked on to support AND hybrid key exchanges    for use in TLS. In terms of signatures, an AND hybrid scheme    would only return valid if both classical and Quantum Safe    signatures are successfully verified.  <\/p>\n<p>    The Rambus    Quantum Safe IP Portfolio allows for the implementation of    hybrid cryptography. The Rambus QSE-IP-86 Quantum Safe Engine    is a standalone cryptographic core that supports the NIST draft    standards FIPS 203 ML-KEM and FIPS 204 ML-DSA and provides    SHAKE-128 and SHAKE-256 acceleration. It can be combined with    an accelerator for traditional asymmetric cryptography such as    the Rambus PKE-IP-85 core that accelerates classic public key    cryptography and a TRNG-IP-76 core that generates true random    numbers. The Rambus RT-600    family of Root of Trust cores provides a robust integrated    solution embedding engines and firmware that support both the    full suite of     CNSA 1.0 classic and     CNSA 2.0 Quantum Safe algorithms (including     NIST SP 800-208 XMSS\/LMS hash-based verification) that can    be used to implement AND hybrid solutions, offering system    security management for use cases like secure boot, secure    debug, secure firmware upgrade, lifecycle and SKU management,    platform attestation and authentication.  <\/p>\n<p>    Join me for my webinar Protecting    Devices and Data in the Quantum Era on January 10, 2024 to    learn about all the latest developments in Quantum Safe    Cryptography and how you can protect your past, current, and    future data in the quantum computing era.  <\/p>\n<p>    Additional resources  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Follow this link:<br \/>\n<a target=\"_blank\" href=\"https:\/\/semiengineering.com\/getting-ready-for-the-quantum-computing-era-thoughts-on-hybrid-cryptography\/\" title=\"Getting Ready For The Quantum Computing Era: Thoughts On Hybrid Cryptography - SemiEngineering\" rel=\"noopener\">Getting Ready For The Quantum Computing Era: Thoughts On Hybrid Cryptography - SemiEngineering<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Using a classical cryptographic algorithm alongside its quantum safe equivalent. Once quantum computers, more specifically Cryptographically Relevant Quantum Computers (CRQCs), have become powerful and reliable enough, they will enable adversaries to break current asymmetric encryption, placing important data and assets at risk.  <a href=\"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/quantum-computing\/getting-ready-for-the-quantum-computing-era-thoughts-on-hybrid-cryptography-semiengineering.php\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"limit_modified_date":"","last_modified_date":"","_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[494694],"tags":[],"class_list":["post-1067279","post","type-post","status-publish","format-standard","hentry","category-quantum-computing"],"modified_by":null,"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/1067279"}],"collection":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/comments?post=1067279"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/1067279\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/media?parent=1067279"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/categories?post=1067279"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/tags?post=1067279"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}